Question 191

A company that must comply with regulations is searching for a laptop encryption product to use for its 40,000 end points. The product must meet regulations but also be flexible enough to minimize overhead and support in regards to password resets and lockouts. Which of the following implementations would BEST meet the needs?
  • Question 192

    An insurance company has an online quoting system for insurance premiums. It allows potential customers to fill in certain details about their car and obtain a quote. During an investigation, the following patterns were detected:
    Pattern 1 - Analysis of the logs identifies that insurance premium forms are being filled in but only single fields are incrementally being updated.
    Pattern 2 - For every quote completed, a new customer number is created; due to legacy systems, customer numbers are running out.
    Which of the following is the attack type the system is susceptible to, and what is the BEST way to defend against it? (Select TWO).
  • Question 193

    Due to a recent breach, the Chief Executive Officer (CEO) has requested the following activities be
    conducted during incident response planning:
    Involve business owners and stakeholders

    Create an applicable scenario

    Conduct a biannual verbal review of the incident response plan

    Report on the lessons learned and gaps identified

    Which of the following exercises has the CEO requested?
  • Question 194

    Given the following code snippet:

    Which of the following failure modes would the code exhibit?
  • Question 195

    A security engineer is working on a large software development project. As part of the design of the project, various stakeholder requirements were gathered and decomposed to an implementable and testable level. Various security requirements were also documented.
    Organize the following security requirements into the correct hierarchy required for an SRTM.
    Requirement 1: The system shall provide confidentiality for data in transit and data at rest.
    Requirement 2: The system shall use SSL, SSH, or SCP for all data transport.
    Requirement 3: The system shall implement a file-level encryption scheme.
    Requirement 4: The system shall provide integrity for all data at rest.
    Requirement 5: The system shall perform CRC checks on all files.